Skip to main content
QMSQMS
QMS
  • Welcome to your QMS
  • Quality Manual
  • Procedures
  • Records
  • TF_Legit.Health_Plus
    • Legit.Health Plus TF index
    • Legit.Health Plus STED
    • Legit.Health Plus description and specifications
    • R-TF-001-007 Declaration of conformity
    • GSPR
    • Clinical
    • Design and development
    • Design History File (DHF)
      • Version 1.1.0.0
        • Requirements
          • REQ_001 The user receives quantifiable data on the intensity of clinical signs
          • REQ_002 The user receives quantifiable data on the count of clinical signs
          • REQ_003 The user receives quantifiable data on the extent of clinical signs
          • REQ_004 The user receives an interpretative distribution representation of possible ICD categories represented in the pixels of the image
          • REQ_005 The user can send requests and get back the output of the device as a response in a secure, efficient and versatile manner
          • REQ_006 The data that users send and receive follows the FHIR healthcare interoperability standard
          • REQ_007 If something does not work, the API returns meaningful information about the error
          • REQ_008 Notify the user if the image does not represent a skin structure
          • REQ_009 Notify the user if the quality of the image is insufficient
          • REQ_010 The device detects if the image is of clinical or dermatoscopic modality
          • REQ_011 The user specifies the body site of the skin structure
          • REQ_012 Users can easily integrate the device into their system
          • REQ_013 The user receives the pixel coordinates of possible ICD categories
          • ignore-this
          • software-design-specification
          • software-requirement-specification
          • user-requirement-specification
        • Test plans
        • Test runs
        • Review meetings
        • πŸ₯£ SOUPs
    • IFU and label
    • Post-Market Surveillance
    • Quality control
    • Risk Management
  • Licenses and accreditations
  • External documentation
  • TF_Legit.Health_Plus
  • Design History File (DHF)
  • Version 1.1.0.0
  • Requirements
  • REQ_005 The user can send requests and get back the output of the device as a response in a secure, efficient and versatile manner

REQ_005 The user can send requests and get back the output of the device as a response in a secure, efficient and versatile manner

Category​

Major

Source​

  • Andy Aguilar, General Manager at Legit.Health
  • Gerardo FernΓ‘ndez Moreno, Technology Manager
  • INTERNAL SYSTEM INPUTS AND OUTPUTS
  • DESIGN INTERFACES
  • USER SAFETY INSTALLATION
  • OPERATION AND MAINTENANCE
  • REGULATORY FUNCTIONAL AND CAPACITY ARCHITECTURE

Activities generated​

  • MDS-252

Causes failure modes

  • Interception of data during transmission (Man-in-the-Middle attacks) due to inadequate or insufficient encryption.
  • Slow response times due to inefficient algorithms or overloaded servers.
  • Requests timing out due to long processing times or server issues.
  • Insufficient server resources leading to delays or failures in processing requests.
  • Intermittent or unreliable network connections causing request failures.
  • Incorrect implementation of access control, leading to unauthorized access or denial of service (DDoS attacks).
  • Insufficient protections against brute force attacks (e.g., not implementing rate limiting and account lockout mechanisms), allowing attackers to guess passwords.
  • Failure to generate or validate access tokens could prevent users from accessing the system.
  • Failure to properly handle token expiration could lead to users being logged out unexpectedly or able to use expired tokens.
  • Revoked or blacklisted tokens are still accepted, enabling previously authorized users to keep access even after their permissions have been revoked.
  • An attacker forces the system to use a less secure algorithm for token verification, making it easier to forge tokens. If the API accepts tokens signed with weak algorithms, it becomes vulnerable to forgery.
  • Failure to properly hash passwords before storage could leave plaintext passwords exposed.
  • Inability to register new users if the user management service is not properly implemented.

Related risks​

    1. The endpoints of the device are not compatible with the user's software
    1. Data transmission failure from care provider's system: the user can't send data to the device
    1. Data input failure: the device can't receive data from the user
    1. Data accessibility failure: the user can't receive data from the device
    1. Data transmission failure: the device can't send data to the user
    1. Interruption of service: users suddenly can't use the medical device due to downtime
    1. An organisation that is not a licensed care provider gets access to the service
    1. The device is integrated by untrained technicians
    1. Non-compliance with the General Safety & Performance Requirements (GSPR)
    1. Medical device input requirements are not defined to users for its proper operation
    1. Instructions for use not available or separate from the product
    1. Inadequate specification of the product's intended purpose
    1. Data breach or unauthorized access: unauthorized persons have access to confidential data of the practitioners and patients
    1. System incompatibility: integration of our device is not compatible with the user platform
    1. Data overwrite: the data cannot be shown in a time-series that reflects the evolution
    1. Integration failure or errors: the user lacks the knowledge required to integrate the product in their system
    1. Device failure or performance degradation: the device is overwhelmed by its use: either not enough storage capacity or unable to handle requests

User Requirement, Software Requirement Specification, Design Requirement and Regulatory Requirement​

  • User Requirement 5.1: Users shall be able to send secure and efficient requests to the device and receive outputs in a timely manner.
  • Software Requirement Specification 5.2: The device shall be designed to handle multiple concurrent requests and respond with minimal latency, ensuring data privacy and integrity during transmission.
  • Design Requirement 5.3: Design the device endpoints in a RESTful manner, ensuring straightforward access and response management, while implementing HTTPS for secure communication.
  • Regulatory Requirement 5.4: The device shall be compliant with data privacy regulation (Regulation (EU) 2016/679 (General Data Protection Regulation)).
  • Regulatory Requirement 5.5: The device shall be compliant with MDR 2017/745, Annex I, point 17.2, 17.4, 18.8, 23.4(ab).

To achieve them, we employ a multifaceted approach that integrates various elements to create a robust and versatile solution.

Description​

Efficient and secure interaction with algorithms plays a pivotal role in the functioning of our medical device, ensuring both patient safety and user satisfaction. The requirements deriving from this reasoning are:

RESTful API implementation​

One of the most effective methods for interacting with our algorithms is through the establishment of a Representational State Transfer (REST) API. This API acts as the bridge between the user interface and the underlying algorithms, facilitating data exchange. By adhering to REST principles, we ensure that our API is resourceful, stateless, and scalable, enabling it to efficiently handle requests while maintaining high performance.

Stringent security measures​

Given the sensitive nature of medical data, the security of our system is paramount. To safeguard the integrity and confidentiality of patient information, we implement a comprehensive security protocol. This includes:

  • Authentication and authorization: We employ robust authentication mechanisms such as OAuth 2.0 or JWT to ensure that only authorized users can access the API. Role-based access control further restricts user privileges, enhancing data security.
  • Data encryption: All data transmitted between the user and the API is encrypted using industry-standard encryption protocols, such as SSL/TLS, to protect against eavesdropping and data breaches.

Minimized service downtime​

To provide an uninterrupted service experience, we prioritize minimizing service downtime through the following strategies:

  • High availability architecture: Our system is designed with redundancy and failover mechanisms to ensure uninterrupted service even in the event of hardware or software failures.

Other control measures​

As part of the sales process, a contract between Legit.Health and customers shall be signed. The contract includes a clause in which the customer declares they are a healthcare provider.

Success metrics​

GoalMetric
User can interact with the deviceSuccessful user interaction with the device via HTTP POST
User cannot interact with the device without a client keyDevice only accepts calls with a registered key
High data encryption coverageThe percentage of encrypted data (both in transit and at rest) is over 85%
High uptimeThe total time the service is available and operational is at least 99%. This translates to no more than 8.76 hours of downtime per year
Cyber attackers cannot compromise device securityThe device is enough resilient to withstand and counteract simulated cyber attacks under penetration testing

Signature meaning

The signatures for the approval process of this document can be found in the verified commits at the repository for the QMS. As a reference, the team members who are expected to participate in this document and their roles in the approval process, as defined in Annex I Responsibility Matrix of the GP-001, are:

  • Author: JD-004, JD-005, JD-009, JD-017
  • Approver: JD-003
Previous
REQ_004 The user receives an interpretative distribution representation of possible ICD categories represented in the pixels of the image
Next
REQ_006 The data that users send and receive follows the FHIR healthcare interoperability standard
  • Category
  • Source
  • Activities generated
  • Related risks
  • User Requirement, Software Requirement Specification, Design Requirement and Regulatory Requirement
  • Description
    • RESTful API implementation
    • Stringent security measures
    • Minimized service downtime
    • Other control measures
  • Success metrics
All the information contained in this QMS is confidential. The recipient agrees not to transmit or reproduce the information, neither by himself nor by third parties, through whichever means, without obtaining the prior written permission of Legit.Health (AI LABS GROUP S.L.)